Show HN: Pipelock – All-in-one security harness for AI coding agents
Source: Hacker News
Introduction
I’m a plumber who taught himself to code. I run a plumbing company during the day and mess with my homelab at night. About a year ago I started running AI agents with full shell access and API keys to help manage my business—scheduling, invoicing, monitoring my K3s cluster.
It worked great until I realized nothing was stopping those agents from sending my credentials anywhere. I had API keys for Slack, email, and cloud services stored in environment variables that any tool could exfiltrate. Static scanners can check code before you install it, but they can’t catch a trusted tool that decides to phone home at runtime.
Pipelock
So I built Pipelock, a single Go binary that sits between your AI agent and the outside world.
What it does
- Outbound secret scanning – Detects API keys, tokens, passwords in traffic and blocks them before they leave.
- SSRF protection – Blocks network access to unauthorized destinations.
- MCP proxy – Wraps MCP servers as a stdio proxy, scanning responses for prompt injection.
- Workspace monitoring – Watches your files for unauthorized changes.
Implementation notes
The hardest part was making it fast enough that you don’t notice its presence. Every HTTP request runs through regex matching and entropy analysis, and I spent a lot of time getting the scanning pipeline under a few milliseconds of latency.
The MCP proxy was trickier: intercepting JSON‑RPC stdio streams in real time without breaking the conversation flow when something gets flagged required several iterations.
Real‑world use
I run it daily on my own setup. My AI assistant manages Slack messages, queries our job‑management API, checks email, and monitors my Kubernetes cluster. Pipelock sits in front of all of it.
Last week it caught a skill that was embedding my Slack token in a debug log heading to an external endpoint—something I would never have noticed without the DLP scanner.
Snyk recently found that 283 out of 3,984 published agent skills (about 7 %) were leaking credentials. Static scanning catches malware; runtime scanning catches everything else.
Getting started
brew install luckyPipewrench/tap/pipelock
pipelock generate config --preset balanced -o pipelock.yaml
pipelock proxy start --config pipelock.yaml
Demo
Feedback wanted
I’m curious about:
- Exfiltration patterns I might be missing.
- Whether the MCP proxy is useful for people running coding agents.
- What breaks if you try it in different environments.
Feel free to share thoughts and suggestions.